Benny Pinkas
Benny Pinkas
כתובת אימייל מאומתת בדומיין biu.ac.il - דף הבית
כותרתצוטט על ידישנה
Privacy preserving data mining
Y Lindell, B Pinkas
Annual International Cryptology Conference, 36-54, 2000
13022000
Efficient private matching and set intersection
MJ Freedman, K Nissim, B Pinkas
International conference on the theory and applications of cryptographic …, 2004
10682004
Multicast security: A taxonomy and some efficient constructions
R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B Pinkas
INFOCOM'99. Eighteenth Annual Joint Conference of the IEEE Computer and …, 1999
10241999
Tracing traitors
B Chor, A Fiat, M Naor, B Pinkas
Information Theory, IEEE Transactions on 46 (3), 893-910, 2000
940*2000
Fairplay-Secure Two-Party Computation System.
D Malkhi, N Nisan, B Pinkas, Y Sella
USENIX Security Symposium 4, 9, 2004
8792004
Efficient oblivious transfer protocols
M Naor, B Pinkas
Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms …, 2001
7672001
Privacy preserving auctions and mechanism design
M Naor, B Pinkas, R Sumner
EC 99, 129-139, 1999
7271999
Privacy preserving data mining.
Y Lindell, B Pinkas
Journal of cryptology 15 (3), 2002
7022002
Oblivious transfer and polynomial evaluation
M Naor, B Pinkas
Proceedings of the thirty-first annual ACM symposium on Theory of computing …, 1999
6901999
A proof of security of Yao’s protocol for two-party computation
Y Lindell, B Pinkas
Journal of cryptology 22 (2), 161-188, 2009
6152009
Secure multiparty computation for privacy preserving data mining
Y Lindell
Encyclopedia of Data Warehousing and Mining, 1005-1009, 2005
5782005
Efficient trace and revoke schemes
M Naor, B Pinkas
International Conference on Financial Cryptography, 1-20, 2000
5532000
FairplayMP: a system for secure multi-party computation
A Ben-David, N Nisan, B Pinkas
Proceedings of the 15th ACM conference on Computer and communications …, 2008
5022008
Proofs of ownership in remote storage systems
S Halevi, D Harnik, B Pinkas, A Shulman-Peleg
Proceedings of the 18th ACM conference on Computer and communications …, 2011
4922011
Cryptographic techniques for privacy-preserving data mining
B Pinkas
ACM Sigkdd Explorations Newsletter 4 (2), 12-19, 2002
4672002
Side channels in cloud services: Deduplication in cloud storage
D Harnik, B Pinkas, A Shulman-Peleg
IEEE Security & Privacy 8 (6), 40-47, 2010
4342010
Secure two-party computation is practical
B Pinkas, T Schneider, NP Smart, SC Williams
International Conference on the Theory and Application of Cryptology and …, 2009
4202009
An efficient protocol for secure two-party computation in the presence of malicious adversaries
Y Lindell, B Pinkas
Annual International Conference on the Theory and Applications of …, 2007
4132007
Visual authentication and identification
M Naor, B Pinkas
Annual International Cryptology Conference, 322-336, 1997
3851997
Securing passwords against dictionary attacks
B Pinkas, T Sander
Proceedings of the 9th ACM conference on Computer and communications …, 2002
3772002
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–20